CVE-2025-53720

8.0 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Windows Routing and Remote Access Service (RRAS) allows authenticated attackers to execute arbitrary code remotely. This affects Windows systems with RRAS enabled, potentially allowing attackers to gain SYSTEM privileges on vulnerable servers. Organizations using Windows servers for routing or VPN services are primarily affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Windows Server, Windows
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Routing and Remote Access Service (RRAS) enabled. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling persistent access, lateral movement, and data exfiltration across the network.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of backdoors or ransomware.

🟢

If Mitigated

Limited impact due to network segmentation, proper authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - RRAS services exposed to the internet are directly accessible to attackers, making exploitation trivial if vulnerable.
🏢 Internal Only: MEDIUM - Requires authenticated access, but internal attackers or compromised accounts could exploit this for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated network access to RRAS service. Heap-based buffer overflows typically require more sophisticated exploitation than stack-based overflows.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53720

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft Update. 2. For enterprise environments, deploy patches via WSUS, SCCM, or Intune. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Temporarily disable Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Network Segmentation

windows

Restrict network access to RRAS services using firewall rules

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723,1701,47,50,51

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RRAS servers from critical assets
  • Enforce strong authentication and monitor for suspicious RRAS access patterns

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr RUNNING

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the relevant security update KB number

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service crashes in Event Viewer (Event ID 7023, 7024)
  • Multiple authentication failures followed by successful RRAS connections
  • Process creation from RRAS service with unusual command lines

Network Indicators:

  • Unusual traffic patterns to RRAS ports (1723, 1701, 47, 50, 51)
  • Network connections from RRAS servers to unexpected internal systems

SIEM Query:

source="windows" AND (event_id=7023 OR event_id=7024) AND service_name="RemoteAccess"

🔗 References

📤 Share & Export